CN107707736A - Mobile terminal and relevant device with stolen safeguard function - Google Patents
Mobile terminal and relevant device with stolen safeguard function Download PDFInfo
- Publication number
- CN107707736A CN107707736A CN201710790044.2A CN201710790044A CN107707736A CN 107707736 A CN107707736 A CN 107707736A CN 201710790044 A CN201710790044 A CN 201710790044A CN 107707736 A CN107707736 A CN 107707736A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- wifi
- positional information
- account
- stolen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Environmental & Geological Engineering (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides the mobile terminal with stolen safeguard function, including the processor and memory to intercouple;The processor is used to perform following steps:Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the positional information of the mobile terminal;The mobile terminal judges whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal hides the application program for the predesignated need for confidentiality installed on the mobile terminal on interface, and forbid the application program of the predesignated need for confidentiality to run, and the positional information is sent to the terminal device bound in advance.The information of protection application program in time, which can so be realized, to be revealed, to improve the security performance of mobile terminal.
Description
Technical field
The present invention relates to communication technical field, more particularly to mobile terminal and relevant device with stolen safeguard function.
Background technology
With the development of the communication technology, mobile terminal is increasingly liked and used by user, and present mobile terminal
It is worth also more and more higher.The situation that mobile terminal is lost often occurs in real life, such as:It is stolen.However, at present
After mobile terminal is stolen, mainly by this way by mobile terminal location, then positional information is sent to server, server
According to the positional information received, and user is transferred to, such user, according to positional information, searches mobile whole according to can
End.So very it is probably that can not give movement for change eventually greatly however, because user is only to be carried out giving mobile terminal for change according to positional information
End, can thus may result in information-leakage.It can be seen that the security performance of mobile terminal is than relatively low at present.
The content of the invention
It is an object of the invention to provide a kind of mobile terminal to be stolen processing method and mobile terminal, solves mobile terminal
Security performance than it is relatively low the problem of.
In order to achieve the above object, the embodiment of the present invention provides a kind of mobile terminal and is stolen processing method, it is characterised in that
Including:
Mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so,
Then gather the positional information of the mobile terminal;
The mobile terminal judges whether the positional information belongs to the movement locus institute that the mobile terminal prestores
Corresponding position range;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, the mobile terminal preassigns what is installed on the mobile terminal
The application program of need for confidentiality is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and will
The positional information is sent to the terminal device bound in advance.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, the mobile terminal moves back the account logged on the mobile terminal
Go out, and delete the password record of the account.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, when detecting that the mobile terminal is logged in communications account, by described in
The relevant information of communications account is sent to the terminal device bound in advance;
The mobile terminal issues the shifting that the communications account is stolen in user in the social webpage of the communications account
The notification message logged in dynamic terminal.
Preferably, methods described also includes:
Mobile terminal to search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;
The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;
WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance by the mobile terminal.
Preferably, methods described also includes:
If described when being in stolen status, the mobile terminal is unlocked, then by the security information in the mobile terminal
It is encrypted.
The embodiment of the present invention also provides a kind of mobile terminal, including:
Acquisition module, unblock authentication failed number is detected for mobile terminal, and judge whether the frequency of failure exceedes
Preset times, if so, then gathering the positional information of the mobile terminal;
Judge module, for judging whether the positional information belongs to the movement locus institute that the mobile terminal prestores
Corresponding position range;
Determining module, if being not belonging to the position range for the positional information, it is determined that the mobile terminal is in
Stolen status;
First sending module, when being in stolen status for the mobile terminal, the mobile terminal will be described mobile whole
The application program for the predesignated need for confidentiality installed on end is hidden on interface, and forbids the predesignated need for confidentiality
Application program is run, and the positional information is sent to the terminal device bound in advance.
Preferably, the mobile terminal also includes:
Removing module, during in stolen status, the mobile terminal moves back the account logged on the mobile terminal
Go out, and delete the password record of the account.
Preferably, the mobile terminal also includes:
Second sending module,, will when detecting that the mobile terminal is logged in communications account during in stolen status
The relevant information of the communications account is sent to the terminal device bound in advance;
Release module, the shifting stolen for issuing the communications account in the social webpage of the communications account in user
The notification message logged in dynamic terminal.
Preferably, the mobile terminal also includes:
Search module, for searching for WIFI signal nearby, and identify the WIFI marks of the WIFI signal nearby;
Enquiry module, in WIFI log-on messages corresponding to WIFI marks described in server lookup;
3rd sending module, for WIFI marks and WIFI log-on messages to be sent to the terminal bound in advance and set
It is standby.
Preferably, the mobile terminal also includes:
Encrypting module, if for it is described be in stolen status when, the mobile terminal is unlocked, then by the mobile terminal
In security information be encrypted.
The embodiment of the present invention also provides a kind of mobile terminal, including:
The processor and memory to intercouple;The processor is used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute
State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores
Enclose;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal
Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed
Breath is sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, by the mobile terminal
The account of login exits, and deletes the password record of the account.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, detect described mobile whole
When end is logged in communications account, the relevant information of the communications account is sent to the terminal device bound in advance;Described logical
Believe in the social webpage of account and issue the notification message that the communications account logs on the mobile terminal that user steals.
Optionally, the processor is additionally operable to:Mobile terminal to search WIFI signal, and identifying near described nearby
The WIFI marks of WIFI signal;The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;Institute
State mobile terminal and WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:If described, the mobile terminal is unlocked when being in stolen status, then will
Security information in the mobile terminal is encrypted.
Optionally, in some possible embodiments of the present invention, the processor is additionally operable to detect the movement eventually
Whether end, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is specified
Intelligent watch whether occur second and get rid of action event, if the intelligent watch, which occurs second, gets rid of action event, judge described the
One get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action,
Judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default
In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes
In in the preset duration, if described first get rid of action event and second whipping as the whipping that event includes originate when
Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes
Duration is respectively positioned within the preset duration, judges that described first gets rid of action event and got rid of with second whipping as what event included
Whether the difference of action initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping work
The difference that the whipping that event includes makees initial time is less than the 3rd predetermined threshold value, judges that described first gets rid of action event and described the
Whether the difference that two whippings make duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping is made
The difference that event makees duration with second whipping as the whipping that event includes is less than the 4th predetermined threshold value, determines the shifting
Same action event occurs in the preset duration for dynamic terminal and the intelligent watch.It is determined that the mobile terminal and institute
State in the case that same action event occurs in the preset duration for intelligent watch, release the stolen shape of the mobile terminal
State.
The embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable recording medium storage
Program code, the instruction that described program code includes are used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute
State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores
Enclose;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal
Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed
Breath is sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal
During robber's state, the account logged on the mobile terminal is exited, and deletes the password record of the account.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal
During robber's state, when detecting that the mobile terminal is logged in communications account, the relevant information of the communications account is sent to pre-
The terminal device first bound;The mobile end that the communications account is stolen in user is issued in the social webpage of the communications account
The notification message logged on end.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Search WIFI signal, and knowing nearby
The WIFI marks of not described WIFI signal nearby;In WIFI log-on messages corresponding to WIFI marks described in server lookup;By institute
State WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:If described when being in stolen status,
The mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
In the embodiment of the present invention, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure surpasses
Preset times are crossed, if so, then gathering the positional information of the mobile terminal;Whether the mobile terminal judges the positional information
Belong to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to institute's rheme
Put scope, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal
The application program for the predesignated need for confidentiality installed on the mobile terminal is hidden on interface, and forbids the finger in advance
Determine the application program operation of need for confidentiality, and the positional information is sent to the terminal device bound in advance.So can be real
Now the information of protection application program will not be revealed in time, to improve the security performance of mobile terminal.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is the schematic flow sheet that a kind of mobile terminal provided in an embodiment of the present invention is stolen processing method;
Fig. 2 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 3 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the structural representation of another mobile terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example is applied, belongs to the scope of protection of the invention.
Fig. 1 is refer to, Fig. 1 is the flow signal that a kind of mobile terminal provided in an embodiment of the present invention is stolen processing method
Figure, as shown in figure 1, including:
101st, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times,
If so, then gather the positional information of the mobile terminal;
103rd, mobile terminal judges whether the positional information belongs to the movement locus institute that the mobile terminal prestores
Corresponding position range;
If the 102nd, the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
104th, when the mobile terminal is in stolen status, the mobile terminal is advance by what is installed on the mobile terminal
Specify the application program of need for confidentiality to be hidden on interface, and forbid the application program of the predesignated need for confidentiality to run,
And the positional information is sent to the terminal device bound in advance.
In the embodiment, it can be realized by above-mentioned steps and hide the application program of need for confidentiality on interface, and
Forbid the application program of the predesignated need for confidentiality to run, the information to mobile terminal can be so protected with a more step.And
These application programs can not also be run so that the information of mobile terminal is effectively protected, so as to reach raising mobile terminal
Information security purpose.Wherein, above-mentioned application program can be payment application, bank application, communication chat should
With program or finance and economics application program etc..
Preferably, methods described also includes:
When the mobile terminal is in stolen status, the mobile terminal moves back the account logged on the mobile terminal
Go out, and delete the password record of the account.
The embodiment, the account of the application program of mobile terminal login can also be further deleted, so as to further protect
Protect the security information of mobile terminal.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, when detecting that the mobile terminal is logged in communications account, by described in
The relevant information of communications account is sent to the terminal device bound in advance;
The mobile terminal issues the shifting that the communications account is stolen in user in the social webpage of the communications account
The notification message logged in dynamic terminal.
In the embodiment, above-mentioned communications account can be the communications account that stealer logs in after mobile terminal is stolen, this
Sample by issued in the social webpage of the communications account communications account logged on the mobile terminal for stealing user it is logical
Know message, it is whole without using the movement so as to be advantageous to pilferage user so as to reach the pilferage shape of pilferage user to be open
End, and then protect the purpose of the security information of mobile terminal.
Preferably, methods described also includes:
Mobile terminal to search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;
The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;
WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance by the mobile terminal.
In the embodiment, each WIFI signal can be in above-mentioned server authentication, so be identified by above-mentioned WIFI,
User's can is confirmed to the identity-related information of the people of mobile terminal steathily, to facilitate user to give mobile terminal for change.
Preferably, methods described also includes:
If described when being in stolen status, the mobile terminal is unlocked, then by the security information in the mobile terminal
It is encrypted.
It can be realized when detecting that mobile terminal is in stolen status, by the mobile terminal by above-mentioned steps
Security information is encrypted, so as to improve the security performance of mobile terminal safety information.Wherein, above-mentioned security information can be moved
The security information that dynamic terminal is pre-set, or user are preassigned, and quilt is in detecting it is of course also possible to be mobile terminal
Automatic identification during robber's state.
Optionally, in some possible embodiments of the present invention, the mobile terminal also can detect described mobile whole
Whether end, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is specified
Intelligent watch whether occur second and get rid of action event, if the intelligent watch, which occurs second, gets rid of action event, judge described the
One get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action,
Judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default
In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes
In in the preset duration, if described first get rid of action event and second whipping as the whipping that event includes originate when
Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes
Duration is respectively positioned within the preset duration, judges that described first gets rid of action event and got rid of with second whipping as what event included
Whether the difference of action initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping work
The difference that the whipping that event includes makees initial time is less than the 3rd predetermined threshold value, judges that described first gets rid of action event and described the
Whether the difference that two whippings make duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping is made
The difference that event makees duration with second whipping as the whipping that event includes is less than the 4th predetermined threshold value, determines the shifting
Same action event occurs in the preset duration for dynamic terminal and the intelligent watch.
Optionally, in some possible embodiments of the present invention, it is determined that the mobile terminal and the intelligent hand
In the case that same action event occurs in the preset duration for table, the stolen status of the mobile terminal is released.
Optionally, the preset duration can be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds or other time.
Optionally, the first predetermined threshold value can be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds or other time.
Optionally, the second predetermined threshold value can be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds or other time.
Fig. 2 is refer to, Fig. 2 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention, as shown in Fig. 2
Including:
Acquisition module 201, unblock authentication failed number is detected for mobile terminal, and judge whether the frequency of failure surpasses
Preset times are crossed, if so, then gathering the positional information of the mobile terminal;
Judge module 202, for judging whether the positional information belongs to the motion rail that the mobile terminal prestores
Position range corresponding to mark;
Determining module 203, if being not belonging to the position range for the positional information, it is determined that at the mobile terminal
In stolen status;
First sending module 204, when being in stolen status for the mobile terminal, the mobile terminal is by the movement
The application program for the predesignated need for confidentiality installed in terminal is hidden on interface, and forbids the predesignated need for confidentiality
Application program operation, and the positional information is sent to the terminal device bound in advance.
Preferably, as shown in figure 3, the mobile terminal also includes:
Removing module 205, during in stolen status, account that the mobile terminal will log on the mobile terminal
Exit, and delete the password record of the account.
Preferably, as shown in figure 4, the mobile terminal also includes:
Second sending module 206, during in stolen status, detect that the mobile terminal is logged in communications account
When, the relevant information of the communications account is sent to the terminal device bound in advance;
Release module 207, stolen for issuing the communications account in the social webpage of the communications account in user
Mobile terminal on the notification message that logs in.
Preferably, as shown in figure 5, the mobile terminal also includes:
Search module 208, for searching for WIFI signal nearby, and identify the WIFI marks of the WIFI signal nearby;
Enquiry module 209, in WIFI log-on messages corresponding to WIFI marks described in server lookup;
3rd sending module 2010, for WIFI marks and WIFI log-on messages to be sent into the terminal bound in advance
Equipment.
Preferably, as shown in fig. 6, the mobile terminal also includes:
Encrypting module 2011, if for it is described be in stolen status when, the mobile terminal is unlocked, then by the movement
Security information in terminal is encrypted.
In the embodiment of the present invention, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure surpasses
Preset times are crossed, if so, then gathering the positional information of the mobile terminal;Whether the mobile terminal judges the positional information
Belong to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to institute's rheme
Put scope, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal
The application program for the predesignated need for confidentiality installed on the mobile terminal is hidden on interface, and forbids the finger in advance
Determine the application program operation of need for confidentiality, and the positional information is sent to the terminal device bound in advance.So can be real
Now the information of protection application program will not be revealed in time, to improve the security performance of mobile terminal.
Referring to Fig. 7, the embodiment of the present invention also provides a kind of mobile terminal 700, including:The He of processor 710 to intercouple
Memory 720;The processor 710 is used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute
State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores
Enclose;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal
Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed
Breath is sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, by the mobile terminal
The account of login exits, and deletes the password record of the account.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, detect described mobile whole
When end is logged in communications account, the relevant information of the communications account is sent to the terminal device bound in advance;Described logical
Believe in the social webpage of account and issue the notification message that the communications account logs on the mobile terminal that user steals.
Optionally, the processor is additionally operable to:Mobile terminal to search WIFI signal, and identifying near described nearby
The WIFI marks of WIFI signal;The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;Institute
State mobile terminal and WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:If described, the mobile terminal is unlocked when being in stolen status, then will
Security information in the mobile terminal is encrypted.
Optionally, in some possible embodiments of the present invention, the processor 710 is additionally operable to detect the movement
Whether terminal, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is referred to
Whether fixed intelligent watch, which occurs second, is got rid of action event, if the intelligent watch, which occurs second, gets rid of action event, described in judgement
First get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action phase
Together, judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is pre-
If in duration, judge that described first gets rid of action event and second whipping whether as the whipping that event includes make duration equal
In the preset duration, if described first gets rid of action event and second whipping originates as the whipping that event includes
Time is respectively positioned in preset duration, and described first gets rid of action event and second whipping is held as the whipping that event includes
Continuous duration is respectively positioned within the preset duration, judges that described first gets rid of what action event and second whipping included as event
Whether the difference that whipping makees initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping
The difference that the whipping included as event makees initial time is less than the 3rd predetermined threshold value, judge described first get rid of action event with it is described
Whether the difference that the second whipping makees duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping
Make event and second whipping and make the difference of duration as the whipping that event includes to be less than the 4th predetermined threshold value, it is determined that described
Same action event occurs in the preset duration for mobile terminal and the intelligent watch.It is determined that the mobile terminal and
In the case that same action event occurs in the preset duration for the intelligent watch, the stolen of the mobile terminal is released
State.
The embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable recording medium storage
Program code, the instruction that described program code includes are used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute
State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores
Enclose;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal
Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed
Breath is sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal
During robber's state, the account logged on the mobile terminal is exited, and deletes the password record of the account.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal
During robber's state, when detecting that the mobile terminal is logged in communications account, the relevant information of the communications account is sent to pre-
The terminal device first bound;The mobile end that the communications account is stolen in user is issued in the social webpage of the communications account
The notification message logged on end.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Search WIFI signal, and knowing nearby
The WIFI marks of not described WIFI signal nearby;In WIFI log-on messages corresponding to WIFI marks described in server lookup;By institute
State WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:If described when being in stolen status,
The mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
The embodiment of the present invention additionally provides another mobile terminal, as shown in figure 8, for convenience of description, illustrate only and this
The related part of inventive embodiments, particular technique details do not disclose, refer to present invention method part.The movement is whole
End can be to include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS
Any terminal device such as (Point ofSales, point-of-sale terminal), vehicle-mounted computer, so that mobile terminal is mobile phone as an example:
Fig. 8 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 8 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input block 930, sensor
950th, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, WiFi) module 970, processor 980 and power supply 990
Deng part.It will be understood by those skilled in the art that the handset structure shown in Fig. 8 does not form the restriction to mobile phone, can wrap
Include than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
Input block 930 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with
And the key signals input that function control is relevant.Specifically, input block 930 may include touching display screen 933, biological identification device
931 and other input equipments 932.Biological identification device 931 can be fingerprint identification device, or, face identification device, or
Person, iris identification device etc..Input block 930 can also include other input equipments 932.Specifically, other input equipments
932 can include but is not limited to physical button, function key (such as volume control button, switch key etc.), trace ball, mouse,
One or more in action bars etc..Wherein, the processor 980 is used to obtain pending image, the pending image
Target area is used to add watermark recovery;Determine the first colouring information of the first image corresponding to the target area;Determine institute
State the absolute value of the colour-difference between the first colouring information and the second colouring information of the watermark recovery;It is small in the absolute value
When predetermined threshold value, color adjustment, and second face after adjustment are carried out to described first image and/or the watermark recovery
Colour-difference between color information and first colouring information is in preset range;By the pending image after adjustment and institute
State watermark recovery to be synthesized, obtain output image.
Processor 980 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform the software program and/or module being stored in memory 920, and call and be stored in memory 920
Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 980 can wrap
Include one or more processing units;Optionally, processor 980 can integrated processor and modem processor, wherein, processor
Main processing operating system, user interface and application program etc., modem processor mainly handles radio communication.It is appreciated that
, above-mentioned modem processor can not also be integrated into processor 980.
In addition, memory 920 can include high-speed random access memory, nonvolatile memory, example can also be included
Such as at least one disk memory, flush memory device or other volatile solid-state parts.
RF circuits 910 can be used for the reception and transmission of information.Generally, RF circuits 910 include but is not limited to antenna, at least one
Individual amplifier, transceiver, coupler, low-noise amplifier (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF
Circuit 910 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication to mark
Accurate or agreement, including but not limited to global system for mobile communications (Global System ofMobile communication,
GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service
(ShortMessaging Service, SMS) etc..
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of touching display screen, proximity transducer can when mobile phone is moved in one's ear, close touching display screen and/
Or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) acceleration
Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone
Gyroscope, barometer, hygrometer, thermometer, the other sensors such as infrared ray sensor, will not be repeated here.
Wherein, voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the COBBAIF between user and mobile phone.Sound
Electric signal after the voice data received conversion can be transferred to loudspeaker 961, is converted to by loudspeaker 961 by frequency circuit 960
Voice signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is received by voicefrequency circuit 960
After be converted to voice data, it is such as another to be sent to through RF circuits 910 then after voice data playback process device 980 is handled
Mobile phone, or voice data is played to memory 920 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 970
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown
WiFi module 970, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Mobile phone also includes the power supply 990 (such as battery) to all parts power supply, and optionally, power supply can pass through power supply pipe
Reason system and processor 980 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1, each step method flow can based on the mobile phone structure realize.
In embodiment shown in 2~Fig. 6 of earlier figures, each unit function can based on the mobile phone structure realize.
The embodiment of the present invention also provides a kind of computer program product, and the computer program product includes storing calculating
The non-transient computer-readable recording medium of machine program, the computer program are operable to make mobile terminal perform as described above
The part or all of step of any method described in embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed method and apparatus, can be by other
Mode realize.For example, device embodiment described above is only schematical, for example, the division of the unit, only
For a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can combine
Or another system is desirably integrated into, or some features can be ignored, or do not perform.Another, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be by some interfaces, the INDIRECT COUPLING or communication of device or unit
Connection, can be electrical, mechanical or other forms.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That the independent physics of unit includes, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs receiving/transmission method described in each embodiment of the present invention
Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, abbreviation
ROM), random access memory (RandomAccess Memory, abbreviation RAM), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Described above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, these improvements and modifications
It should be regarded as protection scope of the present invention.
Claims (10)
- A kind of 1. mobile terminal, it is characterised in that including:The processor and memory to intercouple;The processor is used to perform following steps:Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the shifting The positional information of dynamic terminal;Judge whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;If The positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, by the application for the predesignated need for confidentiality installed on the mobile terminal Program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the positional information is sent out Give the terminal device bound in advance.
- 2. mobile terminal as claimed in claim 1, it is characterised in that the processor is additionally operable to:At the mobile terminal When stolen status, the account logged on the mobile terminal is exited, and deletes the password record of the account.
- 3. mobile terminal as claimed in claim 2, it is characterised in thatThe processor is additionally operable to:When the mobile terminal is in stolen status, detect that the mobile terminal is logged in leading to When believing account, the relevant information of the communications account is sent to the terminal device bound in advance;In the society of the communications account Hand in webpage and issue the notification message that the communications account logs on the mobile terminal that user steals.
- 4. such as the mobile terminal any one of claim 1-3, it is characterised in that the processor is additionally operable to:The shifting Dynamic terminal searching WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;The mobile terminal is in server Inquire about WIFI log-on messages corresponding to the WIFI marks;The mobile terminal sends out WIFI marks and WIFI log-on messages Give the terminal device bound in advance.
- 5. such as the mobile terminal any one of claim 1-3, it is characterised in that the processor is additionally operable to:It is if described During in stolen status, the mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
- A kind of 6. computer-readable recording medium, it is characterised in that computer-readable recording medium storage program code, The instruction that described program code includes is used to perform following steps:Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the shifting The positional information of dynamic terminal;Judge whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, by the application for the predesignated need for confidentiality installed on the mobile terminal Program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the positional information is sent out Give the terminal device bound in advance.
- 7. computer-readable recording medium as claimed in claim 6, it is characterised in that the instruction that described program code includes is also For performing following steps:When the mobile terminal is in stolen status, the account logged on the mobile terminal is exited, And delete the password record of the account.
- 8. computer-readable recording medium as claimed in claim 7, it is characterised in that the instruction that described program code includes is also For performing following steps:When the mobile terminal is in stolen status, detect that the mobile terminal is logged in the account that communicates Number when, the relevant information of the communications account is sent to the terminal device bound in advance;In the social network of the communications account The notification message that the communications account logs on the mobile terminal that user steals is issued in page.
- 9. such as the computer-readable recording medium any one of claim 6-8, it is characterised in that described program code bag The instruction included is additionally operable to perform following steps:Search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby; In WIFI log-on messages corresponding to WIFI marks described in server lookup;WIFI marks and WIFI log-on messages are sent to The terminal device bound in advance.
- 10. such as the computer-readable recording medium any one of claim 6-8, it is characterised in that described program code Including instruction be additionally operable to perform following steps:If described, the mobile terminal is unlocked when being in stolen status, then will described in Security information in mobile terminal is encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710790044.2A CN107707736A (en) | 2017-09-05 | 2017-09-05 | Mobile terminal and relevant device with stolen safeguard function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710790044.2A CN107707736A (en) | 2017-09-05 | 2017-09-05 | Mobile terminal and relevant device with stolen safeguard function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107707736A true CN107707736A (en) | 2018-02-16 |
Family
ID=61172003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710790044.2A Pending CN107707736A (en) | 2017-09-05 | 2017-09-05 | Mobile terminal and relevant device with stolen safeguard function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707736A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769429A (en) * | 2018-06-20 | 2018-11-06 | 努比亚技术有限公司 | Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing |
CN110446162A (en) * | 2019-07-13 | 2019-11-12 | 恒大智慧科技有限公司 | A kind of router anti-lost method and system, computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103607416A (en) * | 2013-12-09 | 2014-02-26 | 吴东辉 | Method and application system for authenticating identity of network terminal machine |
CN106203012A (en) * | 2016-06-22 | 2016-12-07 | 中国联合网络通信集团有限公司 | The processing method of screen locking, device and equipment |
CN106357876A (en) * | 2015-07-14 | 2017-01-25 | 中兴通讯股份有限公司 | Data display method of mobile terminal and device |
CN106658489A (en) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | Terminal application processing method, device and mobile terminal |
-
2017
- 2017-09-05 CN CN201710790044.2A patent/CN107707736A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103607416A (en) * | 2013-12-09 | 2014-02-26 | 吴东辉 | Method and application system for authenticating identity of network terminal machine |
CN106357876A (en) * | 2015-07-14 | 2017-01-25 | 中兴通讯股份有限公司 | Data display method of mobile terminal and device |
CN106203012A (en) * | 2016-06-22 | 2016-12-07 | 中国联合网络通信集团有限公司 | The processing method of screen locking, device and equipment |
CN106658489A (en) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | Terminal application processing method, device and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769429A (en) * | 2018-06-20 | 2018-11-06 | 努比亚技术有限公司 | Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing |
CN110446162A (en) * | 2019-07-13 | 2019-11-12 | 恒大智慧科技有限公司 | A kind of router anti-lost method and system, computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
CN104966005B (en) | A kind of access control method, and terminal device | |
EP2731066B1 (en) | Electronic device and method for controlling payment function of input means | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
US9940448B2 (en) | Unlock processing method and device | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN106778175A (en) | A kind of interface locking means, device and terminal device | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
CN106331370A (en) | Data transmission method and terminal device | |
CN107679410A (en) | Possess the mobile terminal and Related product of certain privacy protection function | |
CN106412311A (en) | Data transmission method and terminal device | |
CN103366104A (en) | Method and device for controlling accessing of application | |
CN107577961A (en) | Mobile terminal and Related product available for security information protection | |
CN107609407A (en) | The guard method of information security and device in a kind of user terminal | |
CN106878554A (en) | A kind of theft preventing method of mobile terminal, device and mobile terminal | |
CN106611152A (en) | User identity determination method and apparatus | |
CN107707736A (en) | Mobile terminal and relevant device with stolen safeguard function | |
CN106066953B (en) | Fingerprint unlocking control method and terminal equipment | |
CN107948390A (en) | The guard method of user data and mobile terminal | |
CN106407779A (en) | Information acquisition method and apparatus, and terminal | |
CN105912914A (en) | Fingerprint unlocking method and terminal equipment | |
CN106503512A (en) | Mobile terminal and its plus/unlocking method and a device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180216 |